They seem to have a variety of issues these days ...
2009-12-31
2009-12-29
Don't probe me, bro ...
By the way, Volokh is one of those sites that you should be studying regularly ...
2009-12-27
2009-12-26
Flight 253 round-up
Now might be a good time to take all the money being spent on identification and behavioral detection and shift it to body scanning and bomb-sniffing dogs ...
2009-12-22
2009-12-20
2009-12-18
It seems fairly unlikely that being able to tap the feed would be helpful without a lot of additional capabilities. You would be hard-pressed to even evacuate a site in the time you would have between the time the plane gets close enough for you to pick up its feed and the time it would be punching your ticket ...
2009-12-15
2009-12-13
2009-12-12
The real story is that the video is probably going to cost your former employer (and maybe you) a lot of money because you and your associates allowed your egos to take the reigns from your professionalism. You can be a solid pro for years but if the few-second lapse is caught on video, that will be seconds that you are judged on ...
2009-12-10
2009-12-09
It's worth noting that if the program effectively precluded the possibility of getting on a plane with the means to interfere with the flight, there wouldn't be any reason to keep it a secret. Beyond that, Sonny Barger pointed out years ago that three people can keep a secret as long as two of them are dead ...
I guess it depends on what the goals are. I suspect that nein-won-won was intended to show us that they could mess with us, too. If you can call that a political goal I would say that terrorism was an effective tool for achieving it. I think that all the curtailment of liberties and general inconvenience at the point of an implied gun that we put up with is more of a reflection of our collective ignorance and laziness than evidence of the efficacy of terrorism ...
2009-12-07
2009-12-06
2009-12-05
2009-12-03
Suppose you decide to protect one of your documents from prying eyes. First, you create an encrypted copy using an encryption application. Then, you “wipe” (or “secure-delete”) the original document, which consists of overwriting it several times and deleting it. (This is necessary, because if you just deleted the document without overwriting it, all the data that was in the file would physically remain on the disk until it got overwritten by other data. See question above for an explanation of how file deletion works.) Ordinarily, this would render the original, unencrypted document irretrievable. However, if the original file was stored on a volume protected by the Volume Shadow Copy service and it was there when a restore point was created, the original file will be retrievable using Previous versions. All you need to do is right-click the containing folder, click Restore previous versions, open a snapshot, and, lo and behold, you’ll see the original file that you tried so hard to delete! The reason wiping the file doesn’t help, of course, is that before the file’s blocks get overwritten, VSC will save them to the shadow copy. It doesn’t matter how many times you overwrite the file, the shadow copy will still be there, safely stored on a hidden volume.
(via Bruce)
2009-12-02
2009-12-01
There's a lot to be said for making it a felony for a TSA agent to take or allow to be taken and type of photo, etc. but even absent that, this is the only really effective method of ensuring that passengers don't have the MEANS of interfering with a flight. All the ID and profiling is foolish and utterly unnecessary if the passengers don't have the means to interfere ...
Subscribe to:
Posts (Atom)